A directory traversal vulnerability in Rasterbar libtorrent might allow a remote attacker to overwrite arbitrary files.
Package | net-libs/rb_libtorrent on all architectures |
---|---|
Affected versions | < 0.13-r1 |
Unaffected versions | >= 0.13-r1 |
Package | net-p2p/deluge on all architectures |
---|---|
Affected versions | < 1.1.9 |
Unaffected versions | >= 1.1.9 |
Rasterbar libtorrent is a C++ BitTorrent implementation focusing on efficiency and scalability. Deluge is a BitTorrent client that ships a copy of libtorrent.
census reported a directory traversal vulnerability in src/torrent_info.cpp that can be triggered via .torrent files.
A remote attacker could entice a user or automated system using Rasterbar libtorrent to load a specially crafted BitTorrent file to create or overwrite arbitrary files using dot dot sequences in filenames.
There is no known workaround at this time.
All Rasterbar libtorrent users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/rb_libtorrent-0.13-r1"
All Deluge users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-p2p/deluge-1.1.9"